Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.5.1035

An Authority-Based Efficient Key Management Protocol for Cloud Environment  

Choi, Jeong-hee (Chungbuk National University)
Lee, Sang-ho (Chungbuk National University)
Abstract
Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.
Keywords
Intra Cloud; Authentication; private key; public key;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Guofeng Lin, Hanshu Hong and Zhixin Sun. "A Collaborative key Management Protocol in ciphertext policy Attribute-Based encryption for Cloud Data Sharing," IEEE Acess. vol 5. pp. 9464-9475. May. 2017   DOI
2 KISIA, "Changes in the IT ecosystem, according to a spreading cloud services and Countermeasure," Korea IT Service Industry Association, 2012
3 Peter Mell and Timothy Grance. "The NIST Definition of Cloud Computing," NIST Special Publication 800-145, Sep. 2011
4 Sung-Jae Jung and Yu-Mi Bae, "Trend analysis of Threats and Technologies for Cloud Security," Journal of Security Engineering, 10(2), pp.199-212, April, 2013
5 Primoz Cigoj, Borka Jerman Blazie and Tomaz Klobucar. "an approach in the design of common authentication solution for a multi-platfotm cloud environment," 5th International Conference on Cloud Computing and Service Science. pp. 365-372. Jan. 2015
6 H. A. Dinesha and V. K. Agrawal, "Multi-level authentication technique for accessing cloud services," Computing, Communication and Applications (ICCCA), 2012 International Conference on, pp. 1-4, Feb, 2012
7 M. Green, S. Hohenberger and B. Waters, "Outsourcing the decryption of ABE ciphertexts," in Proc. USENIX Secur. Symp., pp. 34-40. Aug, 2011
8 Do-hyeon Choi and Jung-oh Park, "Multi-session authentication scheme for secure authentication and session management of cloud services environment," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 9, pp. 2056-2063, Sep. 2015   DOI
9 R Charanya and M Armudhan, "Survey on Access Control Issues in Cloud Computing," Emerging Trends in Engineering, Technology and Science (ICETETS), International Conference on. pp.164-167, Feb. 2016
10 J. Bethencourt, A and Sahai, B.Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Secur. Privacy, pp. 321-334, May. 2007
11 J. Hur, "Improving security and efciency in attribute-based data sharing," IEEE Trans. Knowl. Data Eng., Vol. 25, No. 10, pp. 2271-2282, Oct. 2013   DOI
12 Kevin Walsh and John Manferdelli, "Intra-Cloud and Inter-Cloud Authe ntication," Cloud Computing (CLOUD), IEEE 10th International Conference on. pp.1-8, Jun, 2017
13 Yannan Li, Young Yu, Geyong Min, Willy Susilo, Jianbing Ni and Kim-Kwang Raymond Choo, "Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems," IEEE Transactions on Dependable and Secure Computing, Journal of Latex Class Files, Vol. 14. No. 8, pp. 1-12, Aug. 2015